Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Researchers have identified a serious security flaw in GitHub.com and GitHub Enterprise Server, designated CVE-2026-3854, which could enable an authenticated user to execute arbitrary code remotely with just a single 'git push' command. This command injection vulnerability has a CVSS score of 8.7, indicating its severity. If exploited, it could allow attackers with repository push access to take control over affected systems. This issue affects both individual developers and organizations using GitHub for version control, highlighting the need for immediate awareness and action. Users are advised to monitor their repositories closely and apply any recommended patches as they become available.

Impact: GitHub.com, GitHub Enterprise Server
Remediation: Users should apply security patches provided by GitHub as soon as they are released. Monitoring repository access and permissions is also recommended to mitigate potential exploitation.
Read Original

A Brazilian cybercrime group known as LofyGang has returned after a three-year hiatus, launching a campaign targeting Minecraft players through a malware called LofyStealer, also referred to as GrabBot. This malicious software is disguised as a Minecraft hack named 'Slinky' and uses the official game icon to trick users into executing it. Once installed, LofyStealer can steal sensitive information from the victim's device. This resurgence is concerning for the gaming community, as it shows that cybercriminals are still active and adapting their tactics to exploit popular platforms. Players need to be cautious about downloading third-party software, especially those that claim to enhance game performance or functionality.

Impact: Minecraft players, specifically those who may download unauthorized hacks or mods
Remediation: Avoid downloading unauthorized hacks or mods, and ensure your device has updated antivirus software.
Read Original
Pack2TheRoot: 12-Year-Old Linux PackageKit Flaw Enables Full Compromise

Hackread – Cybersecurity News, Data Breaches, AI and More

Researchers have discovered a serious vulnerability in PackageKit, a package management tool used across various Linux distributions. This flaw, dubbed Pack2TheRoot, allows attackers to gain full root access, potentially compromising the security of affected systems. Linux distributions that utilize PackageKit, which includes many popular versions, are at risk. This vulnerability is particularly concerning because it has been present for over a decade, raising questions about the security practices in place for maintaining open-source software. Users and system administrators are urged to update their systems and apply any available patches to mitigate the risk of exploitation.

Impact: Linux distributions using PackageKit, including Fedora, Ubuntu, and others.
Remediation: Users should update PackageKit to the latest version as patches become available.
Read Original

A new security incident has emerged involving the malicious elementary-data package version 0.23.3, which has been found to steal sensitive developer information and cryptocurrency wallet credentials. The attack took advantage of a flaw in GitHub Actions scripts, allowing the attacker to inject shell code that exposed a GitHub token. This means that anyone using this version of the package could be at risk, potentially compromising their projects and financial assets. Developers and organizations using this package need to take immediate action to secure their systems and prevent unauthorized access to their data. The incident serves as a reminder of the vulnerabilities that can arise in software development environments, particularly when integrating third-party packages.

Impact: elementary-data package version 0.23.3, GitHub Actions
Remediation: Developers should remove the affected version of the elementary-data package and update to a secure version. Additionally, they should rotate any exposed GitHub tokens and review their repository settings for security.
Read Original
Actively Exploited

Vimeo has confirmed that it experienced a data breach affecting user and customer information. The ShinyHunters group claims to possess stolen files and is demanding a ransom to prevent them from leaking this data. This breach raises concerns about the security of Vimeo's platform and the potential exposure of sensitive user information. Affected individuals may face risks such as identity theft or unauthorized access to their accounts. Vimeo's response to the ransom demand and their plans for securing user data will be critical in addressing the fallout from this incident.

Impact: User accounts, customer data, personal information
Remediation: Users should change their passwords and enable two-factor authentication if available. Vimeo needs to enhance security measures to prevent future breaches.
Read Original

Recent legislation has sparked bipartisan criticism as it reauthorizes Section 702 of the Foreign Intelligence Surveillance Act for another three years. House Speaker Mike Johnson introduced this bill after a brief 10-day extension was approved, following unsuccessful attempts to secure an 18-month renewal. Critics from both political parties express concerns about privacy and the implications of ongoing surveillance practices. This legislation allows government agencies to collect foreign intelligence, but opponents argue it risks infringing on the rights of American citizens. The backlash indicates a growing unease regarding surveillance programs and their oversight, raising questions about the balance between national security and individual privacy.

Impact: Section 702 of the Foreign Intelligence Surveillance Act
Remediation: N/A
Read Original

Udemy, a popular e-learning platform, has reportedly suffered a data breach involving more than 1.4 million user records. The ShinyHunters group, known for extortion tactics, claimed responsibility and is threatening to release the stolen data if Udemy does not engage in negotiations by April 27. This breach raises concerns for users about the potential exposure of personal information, which could lead to identity theft or phishing attacks. Companies like Udemy need to take swift action to protect their users and secure their systems against further attacks. The incident highlights the ongoing risks that online platforms face from cybercriminals seeking to exploit vulnerabilities for profit.

Impact: Udemy user accounts and personal information
Remediation: Udemy should enhance security measures, notify affected users, and consider engaging cybersecurity experts to assess vulnerabilities and prevent future breaches.
Read Original

A recent study by Delinea found that 95% of organizations in Singapore are urging their security teams to ease identity controls as they rush to implement artificial intelligence technologies. This trend raises concerns, especially since nearly half of these companies admit their governance frameworks for AI are severely lacking. The push for faster AI deployment could compromise security measures, making organizations more vulnerable to potential threats. As businesses prioritize rapid adoption over careful governance, the implications for data protection and user privacy are significant. This situation underscores the need for a balanced approach that integrates robust security practices while embracing innovation.

Impact: N/A
Remediation: Organizations should enhance their governance frameworks for AI systems and maintain strict identity controls during deployment.
Read Original

A 19-year-old dual citizen of the United States and Estonia has been arrested in Finland and is facing federal charges in the U.S. for his alleged involvement with the Scattered Spider hacking group. This collective is known for its sophisticated cyberattacks, often targeting high-profile organizations. The arrest marks a significant step in the fight against cybercrime, as Scattered Spider has been linked to various data breaches and online scams. The individual’s capture underscores the international efforts to combat hacking and holds potential implications for cybersecurity practices in both the U.S. and Europe. As authorities continue to address the threat posed by such groups, it reinforces the need for enhanced security measures.

Impact: Scattered Spider hacking collective, high-profile organizations, cybersecurity practices
Remediation: N/A
Read Original

Medtronic has confirmed a data breach after the hacking group known as ShinyHunters claimed to have accessed millions of records. This breach raises concerns about sensitive information potentially being exposed, affecting patients and healthcare providers who rely on Medtronic's medical devices and services. While specific details about the type of data compromised are still emerging, the incident highlights vulnerabilities in healthcare IT systems and the importance of robust cybersecurity measures. Medtronic is likely to face scrutiny over its data protection practices, as breaches in the healthcare sector can lead to significant repercussions for patient trust and compliance with regulations. Users and stakeholders should remain vigilant regarding potential phishing attempts or unauthorized communications that may arise following this incident.

Impact: Medtronic's IT systems and potentially sensitive patient data
Remediation: N/A
Read Original

A new scam is targeting users through fake CAPTCHA challenges on typosquatted domains that impersonate telecommunications brands. When users unknowingly visit these fraudulent sites, they may be prompted to complete a CAPTCHA, which is part of a scheme to steal personal information and drain bank accounts. This attack relies on social engineering tactics to trick individuals into providing sensitive data. As a result, victims could face significant financial losses and identity theft. This incident serves as a reminder for users to be cautious when entering personal information online and to verify website URLs before engaging with them.

Impact: Typosquatted domains impersonating telecommunications brands
Remediation: Users should verify website URLs before entering personal information and enable two-factor authentication on their accounts.
Read Original

Checkmarx, a company specializing in application security, has confirmed that their private GitHub repository was breached by the LAPSUS$ hacking group. The stolen data has now been leaked online, raising concerns about the security of sensitive information held by the company. This incident not only affects Checkmarx but may also impact its clients and partners who rely on its services for secure software development. The leak emphasizes the ongoing risks associated with storing code and data in cloud repositories, particularly when they are targeted by sophisticated threat actors. As the situation develops, companies using similar platforms should remain vigilant and review their security measures to prevent similar breaches.

Impact: Checkmarx private GitHub repository
Remediation: Companies should review their repository access controls and implement stricter security measures.
Read Original

Researchers have discovered over 70 cloned Open VSX extensions that are believed to be designed to distribute the GlassWorm malware. These extensions, which mimic legitimate ones, may act as sleeper agents waiting to infect users. This incident poses a significant risk to developers and users who rely on the Open VSX platform for software development, as these malicious extensions could compromise their systems and data. Users are urged to be cautious and verify the authenticity of any extensions they download. This situation raises concerns about the security of extension marketplaces and the potential for widespread malware distribution through seemingly harmless tools.

Impact: Open VSX platform users and developers
Remediation: Users should verify the authenticity of extensions before installation and remove any suspicious extensions from their systems.
Read Original

In 2025, U.S. state privacy regulators imposed $3.425 billion in fines on companies for privacy violations, nearly doubling the $1.827 billion collected in 2024. This significant increase reflects a growing trend in enforcement actions linked to state and federal privacy laws, as noted by Gartner. The surge in fines indicates that regulators are becoming more aggressive in holding companies accountable for mishandling personal data. With this trajectory expected to continue through 2028, businesses must pay closer attention to compliance to avoid costly penalties. This situation underscores the increasing importance of data protection in corporate governance and consumer trust.

Impact: N/A
Remediation: Companies should enhance their data privacy practices and ensure compliance with state and federal privacy laws to mitigate risks of fines.
Read Original

A new report indicates that many security programs falter because they assume that simply connecting systems resolves security issues. Researchers surveyed 500 security professionals and found that this misunderstanding is a significant barrier to implementing effective Zero Trust strategies. The report highlights that the movement of secure data is often more complex than just setting up a gateway and pushing data through. This misjudgment can lead to vulnerabilities and inefficiencies in safeguarding sensitive information. Companies need to reassess their approach to data movement to strengthen their security frameworks and better protect against potential breaches.

Impact: N/A
Remediation: Companies should reassess their data movement strategies and improve security frameworks.
Read Original
PreviousPage 14 of 187Next